# Pastebin XI0H2aU9 Breaking Monero: The Series 1. Breaking Monero: Introduction Description: Introduces the purpose of the Breaking Monero series (openly discuss past, current, and possible future privacy and security implications) In Scope: Introduction, hint of what will be covered Out of Scope: any specifics 2. Breaking Monero: Ring Signatures Introduction Description: overview of what ring signatures are and why they are imperfect. Discuss plausible deniability, and introduce concepts of huristics In Scope: basic explanation of ring signatures and why they are a major pain point. Explain why we use them nevertheless Out of Scope: Any specific attacks using ring signatures (refer to future Breaking Monero episodes) 3. Breaking Monero: Chain Reactions Description: introduce concept of Monero ring signature chain reactions and their impact In Scope: showing how different ringsizes deal with the chain reactions, initial research and history, and other basics to understand future topics Out of Scope: any specific causes of the chain reaction attacks in detail 4. Breaking Monero: 0-Decoy Outputs Description: Monero's previous difficulty with 0-decoy outputs In Scope: history, analysis, research, and explanation of how things have improved. tie in with chain reactions and how they caused a significant impact Out of Scope: everything else 5. Breaking Monero: Chain Splits (Key Image Reuse Attack) Description: what chain splits are and their implications on Monero's security and privacy In Scope: security considerations from decreased hashrate, privacy considerations from key image reuse attack, mitigation methods, largest possible impacts over periods, best practices Out of Scope: most of the community dynamics and politics regarding chain splits 6. Breaking Monero: Input Selection Description: how Monero's imput selection algorithm determines its privacy In Scope: history of selection algorithm (detailed timeline), research, impact on transactions, spend history from Bitcoin and Monero, coinbase inputs, blackball tool Out of Scope: keep pool information as light as possible to save for the other relevant episode 7. Breaking Monero: Timing Attack Description: how timing attacks can be used to learn information about spend patterns and combine with other heuristics to learn a lot about transactions and identities In Scope: what timing metadata is, anticipated heuristics, connection to other metadata Out of Scope: most selection algorithm stuff (other episode) 8. Breaking Monero: Poisoned Outputs (EAE Attack) Description: introduce EAE attack and how it's difficult to defend against In Scope: how Monero's ring signatures provide some protection, and how some aspects (eg: amount metadata when deposited on exchange) can't reasonably be mitigated. Explanation of impact of exchanges and other large merchants Out of Scope: all else 9. Breaking Monero: Public Pool Outputs Description: how public mining pool data reveals information on many outputs In Scope: coinbase outputs, proportion of public mining, impact on chian reactions, pool transactions, how to mitigate Out of Scope: most of the input selection stuff except explicitly relevant 10. Breaking Monero: Unusual Ringsize Description: short episode on how transaction with unusual ringsizes stick out In Scope: history of unusual ringsizes, explanation, arguments for setting a fixed ringsize, other relevant metadata considerations Out of Scope: everything else 11. Breaking Monero: Input/Output Structure Description: how visible information on the NUMBER of inputs and outputs degrades privacy In Scope: how the number of visible transaction inputs and outputs impacts privacy, and what Monero does to limit learned metadata Out of Scope: most other metadata discussion, other cryptocurrencies (Zcash Sapling) 12. Breaking Monero: Subaddress Association Description: how on-chain and other data helps link subaddresses In Scope: situations where subaddresses can be linked, best defenses against leakage Out of Scope: in-depth explainers on ring signatures traceability (already covdered in previous episode) 13. Breaking Monero: IP Address Linking Description: how clients (especially remote nodes) can learn information about transactions In Scope: impact of remote nodes, impact of IP leak, difficulty in performin attack, clarification about consensus layer, possible mitigation methods Out of Scope: Tor/I2P large debate beyond basics, in-depth discussion of Monero's node structure 14. Breaking Monero: View Key Traceability Description: sharing view keys to parties limits privacy, especially for transactions between two individuals using the same service In Scope: intended use of view keys, limitations of transacting with public view key, information revealed Out of Scope: everything else 15. Breaking Monero: Transaction Spam and Large Holder Attacks Description: how spamming the network causes security and privacy concerns (block size, congestion, output visibility) In Scope: basics of Monero's dynamic block size, concerns with holders having visibility of lots of outputs, exchanges and their likely privileged position Out of Scope: in-depth dynamic block size economics, ranting about exchanges 16. Breaking Monero: Undetected Inflation Description: Monero's technology makes it more difficult to audit the supply In Scope: difficulty in using confidential transactions, tradeoffs, explanation about previous responsible disclosure, how people can sleep at night Out of Scope: everything else 17. Breaking Monero: Quantum Computing Description: how quantum computing could pose threats to Monero, but Monero isn't alone and these threats are difficult to predict In Scope: quantum computing basics, general quantum computing concerns for privacy, security, and cryptography, estimated resistance, possible courses of action Out of Scope: everything else 18. Breaking Monero: Manipulated Spent Output List (Blackball List) Description: how a manipulated spent output list could reduce your privacy In Scope: what blackball lists are, why people use them, should you even use them?, history and research Out of Scope: running blackball list and investigating beyond discussing basics